{"id":12,"date":"2021-11-25T19:04:37","date_gmt":"2021-11-25T19:04:37","guid":{"rendered":"https:\/\/www.mysecurityconsole.com\/?page_id=12"},"modified":"2025-08-27T20:56:55","modified_gmt":"2025-08-27T20:56:55","slug":"home","status":"publish","type":"page","link":"https:\/\/www.mysecurityconsole.com\/fr\/","title":{"rendered":"Accueil"},"content":{"rendered":"<div class=\"wp-block-cover alignfull is-light hestia-clear-top-padding\"><span aria-hidden=\"true\" class=\"wp-block-cover__background has-white-background-color has-background-dim-100 has-background-dim\"><\/span><div class=\"wp-block-cover__inner-container is-layout-flow wp-block-cover-is-layout-flow\">\n<p><\/p>\n\n\n\n<h2 class=\"wp-block-heading has-text-align-center has-text-color\" style=\"color:#3c4858\">Why our customers trust MySecurityConsole<\/h2>\n\n\n\n<p class=\"has-text-align-center\">MySecurityConsole is a Managed Detection and Response (MDR) solution providing cybersecurity as a service to small and medium businesses to reduce the risk of financial loss caused by viruses and malware, ransomware &amp; extortion, unplanned downtime and data corruption. Advanced technology protects IT systems from outside attacks, blocks access to known malicious sites, and helps identify network ports that hackers can exploit to gain access to IT infrastructure. Systems are monitored by trained Cybersecurity experts to identify issues that require immediate attention and work with IT staff to stop hackers in their tracks.<\/p>\n\n\n\n<div style=\"height:40px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div class=\"wp-block-columns container is-layout-flex wp-container-core-columns-is-layout-28f84493 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\"><div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"231\" height=\"231\" src=\"https:\/\/www.mysecurityconsole.com\/wp-content\/uploads\/2023\/01\/csec6.jpg\" alt=\"\" class=\"wp-image-360\" style=\"width:58px;height:58px\" srcset=\"https:\/\/www.mysecurityconsole.com\/wp-content\/uploads\/2023\/01\/csec6.jpg 231w, https:\/\/www.mysecurityconsole.com\/wp-content\/uploads\/2023\/01\/csec6-150x150.jpg 150w\" sizes=\"auto, (max-width: 231px) 100vw, 231px\" \/><\/figure>\n<\/div>\n\n\n<h5 class=\"wp-block-heading has-text-align-center has-text-color\" style=\"color:#3c4858;font-size:18px\">Technology and Expertise<\/h5>\n\n\n\n<p class=\"has-text-align-center has-black-color has-text-color\" style=\"font-size:14px\">Protects against inbound threats, prevents users from accessing malicious sites and helps identify systems infected by the latest malware able to bypass and hide from anti-virus. Systems are actively monitored using automated analytics and real cybersecurity experts to identify threats and troubleshoot problems.<\/p>\n\n\n\n<div style=\"height:25px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\"><div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"234\" height=\"234\" src=\"https:\/\/www.mysecurityconsole.com\/wp-content\/uploads\/2023\/01\/csec9.jpg\" alt=\"\" class=\"wp-image-361\" style=\"width:59px;height:59px\" srcset=\"https:\/\/www.mysecurityconsole.com\/wp-content\/uploads\/2023\/01\/csec9.jpg 234w, https:\/\/www.mysecurityconsole.com\/wp-content\/uploads\/2023\/01\/csec9-150x150.jpg 150w\" sizes=\"auto, (max-width: 234px) 100vw, 234px\" \/><\/figure>\n<\/div>\n\n\n<h5 class=\"wp-block-heading has-text-align-center has-text-color\" style=\"color:#3c4858;font-size:18px\">Easy to deploy and Manage<\/h5>\n\n\n\n<p class=\"has-text-align-center has-black-color has-text-color\" style=\"font-size:14px\">A security appliance is installed at the network edge with no configuration changes needed to existing routers or firewalls. The solution is centrally monitored by cybersecurity experts who assess threat information and guide IT personnel to quickly contain and resolve issues to keep your business up and running.<\/p>\n\n\n\n<div style=\"height:25px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\"><div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"176\" height=\"177\" src=\"https:\/\/www.mysecurityconsole.com\/wp-content\/uploads\/2021\/12\/dollar-sign.png\" alt=\"\" class=\"wp-image-164\" style=\"width:58px;height:58px\" srcset=\"https:\/\/www.mysecurityconsole.com\/wp-content\/uploads\/2021\/12\/dollar-sign.png 176w, https:\/\/www.mysecurityconsole.com\/wp-content\/uploads\/2021\/12\/dollar-sign-150x150.png 150w\" sizes=\"auto, (max-width: 176px) 100vw, 176px\" \/><\/figure>\n<\/div>\n\n\n<h5 class=\"wp-block-heading has-text-align-center has-text-color\" style=\"color:#3c4858;font-size:18px\">Save time and money<\/h5>\n\n\n\n<p class=\"has-text-align-center has-black-color has-text-color\" style=\"font-size:14px\">Getting security right takes time and expertise. Getting it wrong can result in costly breaches, ransomware and lost revenue due to unplanned downtime. Our cybersecurity solution and experts take on the cybercriminals allowing you and your staff to focus on the projects and activities that drive your business.<\/p>\n\n\n\n<div style=\"height:25px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p><\/p>\n<\/div>\n<\/div>\n\n\n\n<div style=\"height:40px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-columns container is-layout-flex wp-container-core-columns-is-layout-28f84493 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column col-md-5 is-layout-flow wp-block-column-is-layout-flow\">\n<div style=\"height:55px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">About MySecurityConsole<\/h2>\n\n\n\n<p>Want to find out more? Check out our data sheet for more information on how to protect your business with MySecurityConsole.<\/p>\n\n\n\n<p>Contact us to find out about discounts offered to Canadian businesses.<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column col-md-6 col-md-offset1 is-layout-flow wp-block-column-is-layout-flow\">\n<div style=\"height:55px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<figure class=\"wp-block-image size-medium\"><a href=\"https:\/\/www.mysecurityconsole.com\/wp-content\/uploads\/2023\/01\/MySecurityConsole-DataSheet-2023.pdf\"><img loading=\"lazy\" decoding=\"async\" width=\"224\" height=\"300\" src=\"https:\/\/www.mysecurityconsole.com\/wp-content\/uploads\/2023\/01\/datasheet-224x300.png\" alt=\"\" class=\"wp-image-338\" srcset=\"https:\/\/www.mysecurityconsole.com\/wp-content\/uploads\/2023\/01\/datasheet-224x300.png 224w, https:\/\/www.mysecurityconsole.com\/wp-content\/uploads\/2023\/01\/datasheet.png 713w\" sizes=\"auto, (max-width: 224px) 100vw, 224px\" \/><\/a><\/figure>\n\n\n\n<p><a href=\"https:\/\/www.mysecurityconsole.com\/wp-content\/uploads\/2023\/01\/MySecurityConsole-DataSheet-2023.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Download<\/a><\/p>\n<\/div>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>About MySecurityConsole Want to find out more? Check out our data sheet for more information on how to protect your business with MySecurityConsole. Contact us to find out about discounts offered to Canadian businesses. Download<\/p>","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"class_list":["post-12","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/www.mysecurityconsole.com\/fr\/wp-json\/wp\/v2\/pages\/12","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mysecurityconsole.com\/fr\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.mysecurityconsole.com\/fr\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.mysecurityconsole.com\/fr\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mysecurityconsole.com\/fr\/wp-json\/wp\/v2\/comments?post=12"}],"version-history":[{"count":46,"href":"https:\/\/www.mysecurityconsole.com\/fr\/wp-json\/wp\/v2\/pages\/12\/revisions"}],"predecessor-version":[{"id":510,"href":"https:\/\/www.mysecurityconsole.com\/fr\/wp-json\/wp\/v2\/pages\/12\/revisions\/510"}],"wp:attachment":[{"href":"https:\/\/www.mysecurityconsole.com\/fr\/wp-json\/wp\/v2\/media?parent=12"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}